Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UK: Education Sector Faces Surge in Cyber Breaches

May 1, 2026

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

May 1, 2026

Deep#Door Python Backdoor Evades Detection On Windows

April 30, 2026
Facebook X (Twitter) Instagram
Friday, May 1
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Deep#Door Python Backdoor Evades Detection On Windows
News

Deep#Door Python Backdoor Evades Detection On Windows

Team-CWDBy Team-CWDApril 30, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A stealthy Python-based backdoor framework capable of long-term surveillance and credential theft has been identified targeting Windows systems.

According to research from Securonix, the malware, dubbed Deep#Door, uses an obfuscated batch script to deploy a persistent implant while bypassing traditional detection methods.

Unlike many loaders that retrieve payloads from external servers, Deep#Door embeds its malicious Python code directly within the dropper script.

This self-contained approach reduces network indicators and allows the malware to reconstruct its payload both in memory and on disk during execution.

Script-Based Loader Enables Stealth Deployment

At the core of the attack chain is a heavily obfuscated batch file that disables Windows security features before extracting the embedded Python payload. The script establishes persistence through multiple mechanisms, including startup folder entries, registry run keys and scheduled tasks.

Securonix researchers noted that this method reflects a broader shift toward script-driven intrusion techniques. By relying on native tools like PowerShell, attackers can blend malicious activity with legitimate system behavior and avoid static detection.

The loader also uses a self-referential parsing technique, reading its own contents to extract the embedded payload. This eliminates the need for additional downloads and mimics fileless execution patterns that are harder to detect through network monitoring.

Key features of the malware include:

  • Embedded Python payload reconstructed at runtime

  • Multiple persistence methods including Windows Management Instrumentation (WMI) subscriptions

  • Security controls such as Windows Defender and logging disabled

Tunneling Infrastructure Hides C2

Once deployed, the backdoor communicates with attacker infrastructure via a public TCP tunneling service. This removes the need for dedicated command-and-control (C2) servers and allows malicious traffic to blend with legitimate connections.

The implant supports several capabilities, including keylogging, screenshot capture, microphone recording and browser credential harvesting. It can also extract SSH keys and cloud authentication tokens, enabling lateral movement across enterprise environments.

Read more on backdoor implants: New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

Extensive anti-analysis features further complicate detection. The malware checks for virtual machines, debugging tools and sandbox environments before activating. It also patches core Windows telemetry systems and clears event logs to limit forensic visibility.

“This design significantly reduces network-based detection opportunities and simplifies delivery into restricted environments,” Securonix researchers explained.

Persistent Access With Advanced Evasion Techniques

Deep#Door maintains access through layered persistence mechanisms and watchdog processes that restore components if removed.

Optional WMI subscriptions provide an additional stealthy foothold beyond traditional startup methods.

Beyond surveillance, the malware includes destructive capabilities such as system crashes and boot record overwrites. These features suggest it could be used for both espionage and disruption depending on attacker objectives.

The findings reflect a continued evolution in threat actor tradecraft, where modular, script-based frameworks replace traditional binaries.

By combining in-memory execution, public infrastructure and aggressive defense evasion, Deep#Door demonstrates how modern malware can operate with minimal visibility across compromised systems.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhen Cross-App Permissions Stack into Risk
Next Article Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
Team-CWD
  • Website

Related Posts

News

UK: Education Sector Faces Surge in Cyber Breaches

May 1, 2026
News

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

May 1, 2026
News

When Cross-App Permissions Stack into Risk

April 30, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

What parents should know to protect their children from doxxing

November 28, 2025

How to help older family members avoid scams

October 31, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.